[Title Here, up to 12 Words, on One to Two Lines]
Table of Contents
Explanation Concepts and Procedures Associated with Defensive Technologies 3
Analyzing Use of Honeypots in Securing Network Infrastructures 3
Describing At Least Two Types of Honeypots 3
Analyzing Legal Ramifications of Using Honeypots Within an Organization’s Network 3
Lab 4
References 5
Explanation Concepts and Procedures Associated with Defensive Technologies
Explains the concepts and procedures associated with defensive technologies and discusses why the concepts and procedures are important to an organization.
Analyzing Use of Honeypots in Securing Network Infrastructures
Evaluates the use of honeypots in securing network infrastructures.
Describing At Least Two Types of Honeypots
Describes at least two types of honeypots and when each is likely to be used.
Analyzing Legal Ramifications of Using Honeypots Within an Organization’s Network
Analyzes the legal ramifications of using honeypots within an organization’s network and discusses ways to determine if the benefits outweigh the risks.
Lab
References
There are no sources in the current document.